Products

Centrify Audit & Monitoring Service

Best practices for securing privileged access recommend auditing everything. An audit trail of all actions attributed to a specific user feeds SIEM tools to stop in-progress attacks and aids forensic analysis into abuse of privilege. Because privileged sessions leveraging stolen credentials are a primary attack vector, they can be monitored and terminated in real-time. Video recordings of sessions on critical infrastructure are available for review or use as evidence in the case of a security breach. Centrify Audit and Monitoring Service combines host-based with gateway-based capabilities for maximum coverage. For even greater protection and visibility, take advantage of host-based advanced monitoring at the process level.

dia-Monitor-sessions-1

Advanced Host-Based Session Recording, Auditing, and Reporting

Make it impossible to bypass session recording with host-based auditing. Discover rogue activity such as creating and storing SSH key pairs that make it easy to circumvent security controls and attribute activity to the individual user. Audit all SSH session activity at the shell and process level in forensic detail for security review, corrective action, and compliance reporting.

dia-Monitor-sessions-2

Gateway Session Recording, Monitoring & Control

Gain new levels of oversight for remote sessions to critical infrastructure. Security teams watch privileged sessions in real-time and can instantly terminate suspicious sessions through the Centrify Platform. Gateway-based auditing captures sessions where host-based auditing is not possible for a complete view of privileged access and activity.

There isn’t a regulation that Centrify hasn’t helped us to meet. Today, every time an administrator touches a server, I have a record of it. I can pull a report, print it, and hand it to the auditor.

Peter Manina, IT Specialist and UNIX Systems Architect, State of Michigan Department of Technology, Management and Budget

Learn More About Centrify Server Suite

Ready to Protect Against the #1 Attack Vector?

Click here for more information about our products, pricing, demos, and more.

Contact Us